Sciweavers

1161 search results - page 68 / 233
» Group Message Authentication
Sort
View
CHARME
2003
Springer
129views Hardware» more  CHARME 2003»
15 years 6 months ago
On the Correctness of an Intrusion-Tolerant Group Communication Protocol
Intrusion-tolerance is the technique of using fault-tolerance to achieve security properties. Assuming that faults, both benign and Byzantine, are unavoidable, the main goal of Int...
Mohamed Layouni, Jozef Hooman, Sofiène Taha...
84
Voted
CHI
2005
ACM
16 years 1 months ago
Understanding email use: predicting action on a message
Email consumes significant time and attention in the workplace. We conducted an organizational survey to understand how and why people attend to incoming email messages. We examin...
Laura A. Dabbish, Robert E. Kraut, Susan R. Fussel...
92
Voted
CHI
2005
ACM
16 years 1 months ago
DeDe: design and evaluation of a context-enhanced mobile messaging system
This paper presents the design, implementation and validation of an enhanced mobile phone messaging system (DeDe), allowing the sender to define the context in which the message w...
Younghee Jung, Per Persson, Jan Blom
128
Voted
CNSR
2008
IEEE
214views Communications» more  CNSR 2008»
15 years 7 months ago
HGKM: A Group-Based Key Management Scheme for Sensor Networks Using Deployment Knowledge
Key establishment plays a central role in authentication and encryption in wireless sensor networks, especially when they are mainly deployed in hostile environments. Because of t...
Ngo Trong Canh, Young-Koo Lee, Sungyoung Lee
69
Voted
AICCSA
2005
IEEE
87views Hardware» more  AICCSA 2005»
15 years 6 months ago
A XML format secure protocol - OpenSST
OpenSST (Open Simple Secure Transaction) is a free software project and aims to create an efficient, open and secure alternative to the secure proprietary transaction protocol. Op...
Xinhua Zhang, Chunyan Jiang, Wanjun Huang, Christo...